2016
DOI: 10.1016/j.jisa.2016.03.002
|View full text |Cite
|
Sign up to set email alerts
|

Formal verification of secure information flow in cloud computing

Abstract: Federated cloud systems increase the reliability and reduce the cost of computational support to an organization. However, the resulting combination of secure private clouds and less secure public clouds impacts on the overall security of the system as applications need to be located within different clouds. In this paper, the entities of a federated cloud system as well as the clouds are assigned security levels of a given security lattice. Then a dynamic flow sensitive security model for a federated cloud sy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
13
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 15 publications
(13 citation statements)
references
References 20 publications
0
13
0
Order By: Relevance
“…The number of users who share password to open protected document is the measure of the application risks of the DRM product. For cloud computing systems, the value of opacity or diagnosability is the measure of information flow security after implementing security policies in the systems . Information on choosing and defining security metrics can be found in previous publications…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…The number of users who share password to open protected document is the measure of the application risks of the DRM product. For cloud computing systems, the value of opacity or diagnosability is the measure of information flow security after implementing security policies in the systems . Information on choosing and defining security metrics can be found in previous publications…”
Section: Methodsmentioning
confidence: 99%
“…However, the security metrics which were introduced in these studies focused on the adversary profile, they did not consider the implementation of information security technologies in the systems. In more works, [24][25][26] the authors mentioned that we should consider the cost and benefit of implementing information security policies in cloud computing systems and introduced security metrics to analyze the effect of security policies; however, they did not have a procedure to evaluate the benefit and cost of implementing information security policies.The primary objective of this study is, therefore, to establish a standard procedure for organizations to conduct cost-benefit analyses for information security technologies using stochastic models. This procedure applies the concept of security metrics and stochastic Petri nets to simulate the business processes and human behavior involved in the information security technologies.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…The model introduced in this section resembles Petri net models proposed in [31], [32] which incorporated the Bell-Lapadula rules in cloud computing systems. 1.…”
Section: Definition 4 (Pifm)mentioning
confidence: 99%
“…Some other works about formal semantic analysis of cloud computing are proposed. 50,51 Ghosh et al 50 develop a scalable stochastic analytic model for the performance quantification of Infrastructure-as-a-Service cloud. In contrast, we have proposed a method to address the reliability, running time, and failure processing of resource scheduling in cloud computing.…”
Section: Related Workmentioning
confidence: 99%